My Dad has a STJ pacemaker with the Merlin at home communication device in question. Merlin is a monitoring device that the implantee sets up next to their bed, and it wirelessly monitors the pacemaker while they sleep. In case of a cardiac event, it notifies the central monitoring facilities and also send info about the status of the patient's heart and pacemaker (kind of like a burglar alarm system). It is a real game-changer and has saved many peoples' lives. Merlin operates over old-school POTS (not WiFi or even Ethernet) which these days is likely a bit more secure than going over the Internet anyway. I don't know enough about the attack vector but it sounds like the Merlin station wasn't suitably hardened, which is incredibly common in so many of these first gen in-house technologies. I doubt a hacker could remotely turn off a pacemaker, and that likely wouldn't kill my Dad anyway, but obviously this issue needs to be fixed (and it will).
Having said that -- hackers gonna hack, and I get it. However, it should be illegal to have knowledge of this type of vulnerability with a medical device and to choose not to report it so you and your pathological buddies can short stocks. I can't think of much that's more greedy and immoral than that. This isn't some server to be taken over -- you're potentially messing with real peoples' health so you can make a quick buck. There is no place in any civilized society on earth for those types of inhuman pieces of shit.
Long ago we signed away our rights to contest being fired or laid off.
You can thank people like the Millennial I fired for sleeping on the job. Or the other one I fired for (repeatedly) feeling like he didn't need to show up for his shift. Why should an employer have to waste time and money going through some bullshit appeals process for dead weight like these two clowns?
You are assuming these people won't get better jobs. Every time I was fired / let go in tech, I always found a better gig. In this industry especially, such an event is likely to be a blessing in disguise for the worker. By knocking them out of their comfort zone they may very possibly end up in a situation they otherwise never would have.
Spinning rust had a great run . . . but we're already well into the era of storage on chips. A lot of these folks will upgrade their skill sets by making a move, even if it's not their choice to do so.
When you fly out of Israel's Ben Gurion Airport (at least when I did 10 years ago), you first have to stop at a Godfather-style tollbooth about a mile from the terminal. There, about four soldiers with automatic surround your car while a fifth sticks a mirror on a big pole underneath, looking for bombs. I think they looked inside the trunk too. Once you get to the main terminal, before you can enter the doors, you're stopped by another armed soldier who asks you what you're doing there, where you are headed, etc. All the while, they're looking at you to see if you appear suspicious in any way. Once inside, you go through more traditional security, except you have to open your bags and show them everything you have. They're specifically interested in asking you about anything you bought in Israel, who you got it from, where, etc. All the while, the security folks are comparing notes. If there's something wacky or suspicious about you or your story, then that triggers additional "interrogations."
Since the Lod massacre in 1972, Israel has not suffered another terrorist attack against their airports or planes because they decided to take real precautions to prevent them. The rest of the world (for now) chooses not to follow their model.